Cited By
View all- Kutschera SSlany WRatschiller PGursch SDagenborg H(2023)MRNG: Accessing Cosmic Radiation as an Entropy Source for a Non-Deterministic Random Number GeneratorEntropy10.3390/e2506085425:6(854)Online publication date: 26-May-2023
In this article, we study the security of the IDEA block cipher when it is used in various simple-length or double-length hashing modes. Even though this cipher is still considered as secure, we show that one should avoid its use as internal primitive ...
In this paper, we propose two new ways to mount attacks on the SHA-3 candidates Grøstl , and ECHO , and apply these attacks also to the AES. Our results improve upon and extend the rebound attack. Using the new techniques, we are able to extend the ...
We present new attacks on the Feistel network, where each round function consists of a subkey XOR, S-boxes, and then a linear transformation (i.e., an SP round function). Our techniques are based largely on what they call the rebound attacks. As a ...
Association for Computing Machinery
New York, NY, United States
Check if you have access through your login credentials or your institution to get full access on this article.
Sign inView or Download as a PDF file.
PDFView online with eReader.
eReaderView this article in HTML Format.
HTML Format